Remote Code Execution Vulnerability in Cisco Wireless LAN Controller Software
CVE-2018-0245

5.3MEDIUM

Key Information:

Vendor
Cisco
Vendor
CVE Published:
2 May 2018

Summary

A vulnerability in the REST API of Cisco 5500 and 8500 Series Wireless LAN Controller Software allows an unauthenticated, remote attacker to access restricted system information. This issue originates from insufficient input validation protocols within the REST API URL requests. By crafting a malicious URL, an attacker can exploit this flaw to gain insights into sensitive details that are typically secured from unauthorized access. The exposure poses a risk to the integrity of network operations and demand immediate attention to prevent unauthorized disclosures of system configurations and data.

Affected Version(s)

Cisco 5500 and 8500 Series Wireless LAN Controller Cisco 5500 and 8500 Series Wireless LAN Controller

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.